CGS 2060 Computer Security

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Diagnosing a hacked system

-Fake antivirus messages -Unwanted browser toolbars -Frequent random fake emails or social media messages from your account.

virus infection options

-Opening an infected Email attachment -Downloading an infected file from the Internet -Sharing infected files -Visiting a contaminated Web site

Worm

A destructive program that replicates itself throughout a single computer or across a network. -both wired and wireless

On-going series of events

More serious than single event cybercrimes. On-going series of events include cyberstalking, child predation, extortion, blackmail, and terrorist activities.

Packet Sniffer

Specialized hardware or software that capture packets transmitted over a network.

Single Event

Victims endure a single event cybercrime such as unknowingly downloading a Trojan horse virus, installing a keystroke logger, phishing, theft or manipulation of data via hacking or viruses, identity theft, or e-commerce fraud

Keystroke logger

a form of spyware that records all actions typed on a keyboard -can be hardware or software

Hacker

a person who gains unauthorized access to networks in order to steal and corrupt information and data.

Cookie

a small text file of information created by websites you visit that your web browser stores on your hard disk.

rootkit

a type of malware that is triggered each time you boot your computer. -allows the instillation of hidden files and hide in OS

Pharming

a type of phishing that seeks to obtain personal information through malicious software that is deposited on a victim's computer.

Macro virus

a virus that is written in a macro language and placed within a document or spreadsheet.

DoS(Denial of Service)

an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests.

Spam

an unsolicited email message

Online nuisances

annoying software programs that can slow down the operations of a computer, clog email inboxes, and lead to the theft of information and money. -spam -spyware -phish/pharm -troll/spoof

Trojan

appears legitimate, but executes an unwanted activity when activated.

Persistent Cookie

are stored on the hard drive and are not lost when the web browser is closed. -collect information about user preferences, username and password information, IP address, and web surfing behavior. -not lost if no expiry date

Spam Filter

computer software that is designed to prevent spam messages from entering a user's email inbox.

Cyber Crime

criminal activity committed with a computer. -information theft, data manipulation, cyberbullying, and data corruption.

Malware

designed to steal information, destroy data, impact the operations of a computer or network, or frustrate the user

Network Address Translation (NAT)

developed by Cisco and is used by firewalls, routers, and computers that are part of a network and are connected to the Internet -to maximize security it must be used in conjunction with the firewall built into the router

Session Cookie

files that are stored in temporary memory.

Cyberbulling/cyberstalking

harming or harassing a person or group of people via information technology and networks in a repeated deliberate manner.

Phishing

illegitimate use of an email message that appears to be from an established organization such as a bank, financial institution, or insurance company. .

Internet Filters

is firewall software used to block access to specific Internet content.

Firewall

is hardware or software used to keep a computer secure from outside threats such as hackers and viruses. -A packet filter inspects each packet leaving or entering a network and either accepts or rejects it based on a predetermined set of rules. -Proxy Server - Intercept all messages between client and server and help avert a hacker or other intruder from attacking a network.

DDos(Distributed Denial of Service)

launches a virus on a computer. -computers are infected and act as zombies

Cyberattack

operating system may not launch properly, and the computer user may need to reboot and restart the computer frequently to ensure all programs are starting and working fine

Virus Symptoms

operating system may not launch properly, and the computer user may need to reboot and restart the computer frequently to ensure all programs are starting and working fine

Spyware

software that collects information about your Internet surfing habits and behaviors.

Adware

software that collects the user's web browsing history.

Computer Virus

software that infects computers and is created using computer code. -can destroy programs or change network operation

Hactivism

the act of hacking, or breaking into a computer system for a politically or socially

Script riddles

try to illegally gain access to computer systems using programs (scripts) that others have written.

Ransomware

when activated, encrypts files on user hard drive and then sells a decryption program.

Keystroke logging Trojan

when activated, saves all keystrokes for subsequent transmission to virus creator.


Set pelajaran terkait

CT-Exam Secrets Practice Questions

View Set

Biology Unit 5 Chapter 16 - DNA Technology

View Set

Chapter 5: The Auditory System, Sound and Ear

View Set

BUS215 Chapter 7 Mutual Assent (Offer, Acceptance, Consideration

View Set